Instructor: Hal Pomeranz
Course Length: 6-Hours
Price: $95
Includes: Six months access to class recordings, certificate of participation.

In most organizations, the only thought given to SELinux is remembering to turn it off when installing new systems. And yet as I respond to intrusion after intrusion on Linux systems, I know that most of them would never have happened had SELinux been properly deployed.
SELinux has been hampered by a suspicious pedigree (“It comes from the NSA—fear it!”) and a horrible initial roll-out (“This breaks everything—kill it with fire!”). But largely the issue is that the SELinux universe stands outside the normal Linux security model and troubleshooting strategy. Things break in mysterious ways when you enable SELinux, and the fixes are not obvious.
This two-part, hands-on course attempts to break down some of the barriers to SELinux adoption in your organization. Part One focuses on a high-speed introduction to SELinux and a troubleshooting strategy to help you diagnose and correct issues due to SELinux. Part Two gets into the guts of SELinux and provides guidance on developing SELinux policies for new services.
KEY TAKEAWAYS
Students will learn basic commands for interacting with the SELinux universe as well as how to:
- Troubleshoot system issues where SELinux is enabled
- Correct issues so your applications can work safely with SELinux
- Extend the default SELinux policy to work with new applications
WHO SHOULD TAKE THIS COURSE
- Linux SREs and System Admins
- Security Engineers/Architects
- Linux Developers/DevOps
- SOC Analysts, Incident Responders
AUDIENCE SKILL LEVEL
Experience with Linux and the Linux command-line is preferred. No experience with SELinux is necessary or assumed.
STUDENT REQUIREMENTS
Students should be comfortable working with the Linux command line.
WHAT EACH STUDENT SHOULD BRING
- High-speed Internet access
- A BitTorrent client for downloading course materials (e.g., Transmission)
- A computer with at least 150GB of free space and capable of running a 64-bit VMware virtual machine using 4GB of RAM
WHAT STUDENTS WILL BE PROVIDED WITH
Students will receive course slides, author notes, lab exercises and virtual machine, all via electronic download.
TRAINER & AUTHOR

Hal Pomeranz has spent more than thirty years providing pragmatic Information Technology and Security solutions for some of the world’s largest commercial, government, and academic institutions. He is a frequent presenter at national and local technical gatherings and the author of numerous books and articles in the field of Information Security and Digital Forensics.
COURSE SCHEDULE
Wed, March 9, 2022 11:00 AM – 3:00 PM ET
Thu, March 10, 2022 12:00 PM – 3:00 PM ET